1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
3 years ago
6

25 POINTS PLATO

Computers and Technology
2 answers:
USPshnik [31]3 years ago
7 0

Answer:

lookup value   =  "paramount"

Search table   =  A1:A4

Result table     =  B1;B4

Explanation:

lookup, what are we looking up.....:::///????Paramount

What is the beginning search table......A1;A4

Column B contains the words meanings.....this is the result we want:

So the Result table......B1:B4

OLEGan [10]3 years ago
3 0

Answer:

yesh

1.c

2.a

3.b

Explanation:

You might be interested in
An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
yarga [219]
<span>I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.</span>
5 0
3 years ago
What error occurs when you perform an illegal math operation such as divide by zero
ch4aika [34]

the answer is Arithmetic Exception error

7 0
3 years ago
If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
ehidna [41]

Answer:

Runa, because  she’s like me I r l lol

Explanation:

3 0
3 years ago
How would you describe enterprise computing
umka21 [38]

Answer:

It depends on the project that you are doing. If the project is on a computer and it takes effort yes it would be enterprise.

Sorry if I made no sense hopefully I helped you have a great day! :]

6 0
3 years ago
¿Por qué es importante usar adecuadamente el celular?
posledela

Answer:

to stop it from breaking

Explanation:

5 0
3 years ago
Other questions:
  • Which of the following should you always wear to avoid being thrown from a vehicle and then crushed if it tips over?
    12·2 answers
  • Which characteristic would be best for a person seeking a career in the Telecommunications pathway?
    15·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • What command prompts should be used to assign an IP address to:
    9·1 answer
  • 1 Point
    14·1 answer
  • I make a budget of my 1st Gamer PC its good?
    9·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Cine stie repede va rog mult si repede
    9·1 answer
  • Any device that uses light to read and write information.
    9·2 answers
  • Compiler is an example of​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!